Date: Wed, 9 Aug 2017 12:01:10 +0000 (UTC) From: Antoine Brodin <antoine@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r447624 - head/security/metasploit Message-ID: <201708091201.v79C1A8a079627@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: antoine Date: Wed Aug 9 12:01:10 2017 New Revision: 447624 URL: https://svnweb.freebsd.org/changeset/ports/447624 Log: Update to 4.15.5 Modified: head/security/metasploit/Makefile head/security/metasploit/distinfo Modified: head/security/metasploit/Makefile ============================================================================== --- head/security/metasploit/Makefile Wed Aug 9 11:59:56 2017 (r447623) +++ head/security/metasploit/Makefile Wed Aug 9 12:01:10 2017 (r447624) @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= metasploit -PORTVERSION= 4.15.0 +PORTVERSION= 4.15.5 CATEGORIES= security MAINTAINER= tanawts@gmail.com @@ -26,8 +26,8 @@ RUN_DEPENDS= nmap:security/nmap \ rubygem-metasploit-credential>=0:security/rubygem-metasploit-credential \ rubygem-metasploit_data_models>=0:security/rubygem-metasploit_data_models \ rubygem-metasploit-model>=0:security/rubygem-metasploit-model \ - rubygem-metasploit-payloads>=1.2.37:security/rubygem-metasploit-payloads \ - rubygem-metasploit_payloads-mettle>=0.1.10:security/rubygem-metasploit_payloads-mettle \ + rubygem-metasploit-payloads>=1.2.46:security/rubygem-metasploit-payloads \ + rubygem-metasploit_payloads-mettle>=0.1.14:security/rubygem-metasploit_payloads-mettle \ rubygem-msgpack1>=0:devel/rubygem-msgpack1 \ rubygem-network_interface>=0:net/rubygem-network_interface \ rubygem-rubyntlm>=0:net/rubygem-rubyntlm \ @@ -87,8 +87,8 @@ NO_ARCH= yes NO_ARCH_IGNORE= template_x64_bsd.bin template_x86_bsd.bin CVE-2013-2171.bin STRIP= -USE_RUBY= yes USES= python shebangfix +USE_RUBY= yes PYTHON_NO_DEPENDS= yes SHEBANG_FILES= data/exploits/CVE-2017-7494/build.sh \ data/exploits/CVE-2017-7494/install-deps.sh \ @@ -98,6 +98,7 @@ SHEBANG_FILES= data/exploits/CVE-2017-7494/build.sh \ external/source/msfJavaToolkit/testCompilation.rb \ external/source/metsvc/test.rb \ docker/bin/msfvenom \ + docker/bin/msfvenom-dev \ docker/bin/msfconsole \ docker/bin/msfconsole-dev \ tools/hardware/killerbee_msfrelay \ @@ -112,6 +113,8 @@ RUN_DEPENDS+= rubygem-xmlrpc>=0:net/rubygem-xmlrpc post-patch: ${REINPLACE_CMD} 's,git ls-files,find . ! -type d | sed "s|^./||", ; \ + /bcrypt_pbkdf/d ; \ + /rbnacl/d ; \ /rb-readline/d' \ ${WRKSRC}/metasploit-framework.gemspec ${REINPLACE_CMD} "/pg/s|, '0.20.0'||" ${WRKSRC}/metasploit-framework.gemspec Modified: head/security/metasploit/distinfo ============================================================================== --- head/security/metasploit/distinfo Wed Aug 9 11:59:56 2017 (r447623) +++ head/security/metasploit/distinfo Wed Aug 9 12:01:10 2017 (r447624) @@ -1,3 +1,3 @@ -TIMESTAMP = 1499949808 -SHA256 (rapid7-metasploit-framework-4.15.0_GH0.tar.gz) = f3a21c3aedaa94c26e61dd22609863123956916a7b7b46c8d76541ce16708c66 -SIZE (rapid7-metasploit-framework-4.15.0_GH0.tar.gz) = 24001400 +TIMESTAMP = 1501956463 +SHA256 (rapid7-metasploit-framework-4.15.5_GH0.tar.gz) = 41e1a9904161341ba004e49e7a86ea2490308c6892a1b235ec6074340e479276 +SIZE (rapid7-metasploit-framework-4.15.5_GH0.tar.gz) = 24037977
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201708091201.v79C1A8a079627>